Results 31 to 40 of about 981,149 (222)

Reconsidering the Security Bound of AES-GCM-SIV

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption scheme currently considered for standardization by the Crypto Forum Research Group (CFRG).
Tetsu Iwata, Yannick Seurin
doaj   +1 more source

A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
OCB3 is one of the winners of the CAESAR competition and is among the most popular authenticated encryption schemes. In this paper, we put forward a fine-grain study of its security against side-channel attacks.
Francesco Berti   +6 more
doaj   +1 more source

Understanding RUP Integrity of COLM

open access: yesIACR Transactions on Symmetric Cryptology, 2017
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function.
Nilanjan Datta   +3 more
doaj   +1 more source

Resource Mediated Competition of two South Texas Natives: _Acacia berlandieri_ and _Trichloris pluriflora_ [PDF]

open access: yes, 2009
*Background/Question/Methods* _Acacia berlandieri_, an early-successional C~3~ woody shrub legume, and _Trichloris pluriflora_, a late-successional/climax C~4~ mid-tall grass, reside in similar habitats and have both been documented in Texas ...
Paul N. Jurena, Sara J. Roach
core   +2 more sources

Cube-like Attack on Round-Reduced Initialization of Ketje Sr

open access: yesIACR Transactions on Symmetric Cryptology, 2017
This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like attacks. Ketje is one of the remaining 16 candidates of third round CAESAR competition, whose primary recommendation is Ketje Sr.
Xiaoyang Dong   +3 more
doaj   +1 more source

State-Recovery Attacks on Modified Ketje Jr

open access: yesIACR Transactions on Symmetric Cryptology, 2018
In this article we study the security of the authenticated encryption algorithm Ketje against divide-and-conquer attacks. Ketje is a third-round candidate in the ongoing CAESAR competition, which shares most of its design principles with the SHA-3 hash ...
Thomas Fuhr   +2 more
doaj   +1 more source

Current Development of Authenticated Encryption and its Usage in the TLS Protocol [PDF]

open access: yes, 2015
Tato práce se zaměřuje na přidání nové šifrovací sady s autentizovaným šifrováním do OpenSSL implementace TLS protokolu použitím EVP API. Nová šifra byla vybrána z přihlášených algoritmů do CAESAR soutěže.
Žák Jan
core  

2D Co‐Mo‐Hydroxide‐Based Multifunctional Material for the Development of H2‐Based Clean Energy Technologies

open access: yesAdvanced Materials, EarlyView.
2D α‐Co(OH)2 interleaved with Mo species displays an appealing dual functionality for the production and use of green hydrogen.Mo incorporation greatly benefits the electrochemical behaviour in Oxygen Evolution Reaction for H2 production, while the magnetocaloric response at liquid H2 temperature paves the way for alternative cryogenic refrigerants ...
Daniel Muñoz‐Gil   +14 more
wiley   +1 more source

Assessing Agricultural Green Total Factor Productivity in Latin America

open access: yesAgribusiness, EarlyView.
ABSTRACT The agricultural sector in Latin America plays a vital role in ensuring food security while impacting the environment. However, there remains a lack of analysis regarding the inputs responsible for pollution within its sub‐technologies. Hence, this article aims to assess agricultural green total factor productivity (TFP) through a novel ...
Tianxiang Li   +2 more
wiley   +1 more source

DPA Protected Implementation of OCB and COLM Authenticated Ciphers

open access: yesIEEE Access, 2019
Authenticated ciphers are designed to provide two security requirements simultaneously, i.e. confidentiality and integrity. The CAESAR competition was ended with introducing six authenticated ciphers for several applications as the winners.
Mohsen Jahanbani   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy